A. Keep systems patched.
C. Post-assessment
A. Use an automated patching system.
C. Block all unused ports.
B. To determine whether shutting down this service will affect other services
A. Block all ports except 80.
D. Proxy server
C. Only those with a need for the specific data should have access.
D. Pre-assessment, on-site assessment, post-assessment
B. Once per vear
C. Perform system patches, probe for flaws, check logs, and review policies
D. All of these answers are correct.
D. Installing software or changing system settings
B. Offsite in a secure location
A. Uninstall all unneeded programs/software.
B. Segment the network with firewalls between the segments.
C. Put a firewall between the web server and the network.
C. Only download from well-known, reputable sites.
A. CISSP
D. Ten years of experience as a hacker and cracker, MCSE/CIW and Security+, Ph.D. in computer science